Security News > 2020 > June

Cisco has patched a high-severity flaw in its NX-OS software, the network operating system used by Cisco's Nexus-series Ethernet switches. If exploited, the vulnerability could allow an unauthenticated, remote attacker to bypass the input access control lists configured on affected Nexus switches - and launch a denial of service attacks on the devices.

The Octopus Scanner malware, which targets the Apache NetBeans Java integrated development environment, has been nesting in at least 26 GitHub source-code repositories, according to researchers - waiting to take over developer machines. Once a developer does so, Octopus Scanner unfurls itself, first scanning the developer's computer for the presence of NetBeans.

Google has started rolling out the June 2020 security patches for the Android operating system, which address a total of 43 vulnerabilities, including several rated critical. This is one of the two critical remote code execution issues patched in System, both affecting Android releases 8.0 through 10.

A recently patched vulnerability affecting VMware Cloud Director has a major impact for cloud services providers as it can allow an attacker to take full control of all private clouds hosted on the same infrastructure, cybersecurity firm Citadelo revealed on Monday. Citadelo researchers found that an authenticated attacker could exploit the vulnerability by sending specially crafted traffic to Cloud Director either via API calls or the web interface.

Apple quietly pushed out a small but important update for operating systems across all of its devices, including a patch for a zero-day exploit used in an iPhone jailbreak tool released last week. Jailbreak tools take advantage of vulnerabilities in iOS to allow users root access and full control of their device, in order to load programs and code from outside of the Apple walled garden.

The Business Email Compromise is a popular type of attack among cybercriminals as it targets businesses and individuals in an attempt to receive money transferred into fraudulent accounts. In another method, the attackers use phishing, credential theft, or other means to gain control of the email accounts of the people they want to impersonate.

Back in March, Daniel Winzen, the German software developer who runs DH, originally said that his portal was kaput, at least for the foreseeable future which he also said, more or less, after DH suffered an earlier attack in September 2018. DarkOwl - a darknet intelligence, tools, and cybersecurity outfit that keeps an eye on DH and other dark web goings-on and which analyzed the September 2018 breach - had spotted Winzen's post acknowledging the most recent attack and shared it on Twitter on 10 March.

Britain's National Crime Agency has hit on what looks like a simple way to stop impressionable teens from being sucked into cybercrime - advertise the terrible legal consequences using Google Ads. It sounds too good to be true - can a simple ad deter teen would-be hackers that easily? In fact, the evidence of similar campaigns run by the NCA in the past is that it has some effect.

With the proliferation of cloud in enterprise environments, the concept of "Identity" today is very different than how it used to be. Threatpost host Cody Hackett talks to Brian Johnson, CEO and co-founder of DivvyCloud by Rapid7, about how identity access management is rapidly changing - and how businesses can keep up.

Microsoft is sponsoring a Machine Learning Security Evasion Competition this year, with partners CUJO AI, VMRay, and MRG Effitas, the company has announced. The competition, which welcomes both machine learning practitioners and cybersecurity professionals, will allow researchers to exercise their defender and attacker skills, Microsoft says.